Skip Ribbon Commands
Skip to main content
Navigate Up
Cybertip Management
Sign In
Page Banner
Skip Navigation LinksNCJTC Home > ICAC > On-site Training > FVTC ICAC T&TA > Cybertip Management

 CyberTip Management Course

Four computers surrounding a world globe

  The CyberTip Management course will provide an in-depth review of the National Center for Missing and Exploited Children’s Cybertipline program. Participants will learn how CyberTip reports are received, processed, and disseminated by NCMEC Analysts. Attendees will spend one-on-one time with NCMEC analysts in an interactive and open environment geared towards providing a clear understanding of the inner workings of the CyberTipline. They will observe and interact with the Analysts as they process a variety of Electronic Service Provider and public reports.

In addition, this training program will instruct participants on CyberTipline Download Manager, the software application that enhances and streamlines the process of downloading and organizing CyberTipline reports. This class imparts the skills necessary to use the software application developed for use with the NCMEC’s VPN.

Length of the Program is 2-1/2 days

Prerequisite: The students attending this course must have primary responsibility for CyberTips within their agency. They must have VPN access to NCMEC CyberTipLine and be familiar with its use. Each student should bring their agency reports and forms as they relate to CyberTips and Internet investigations. These forms should be in electronic format.

Max class size: 30

Target Audience: This training is open to state, local and federal law enforcement investigators who have primary responsibility for downloading and managing CyberTips within their agency. Participants must currently have the NCMEC VPN installed and must be actively using it. State and local agency registrants must be a member of a Regional ICAC Task Force or Affiliate Agency. Federal will receive consideration on a case-by-case basis.

How to Register for this course: The dates and locations that are available for this course are shown below in the box titled "Course Schedule". Click on the links in the Class Type for registration. In order to register for this course, the course must be open or waitlisted in the training schedule displayed below.

Once the course is completed this site is also available as an ongoing resource for attendees to keep current on the issues and technology changes that are so common in these investigations. Class resources and a discussion board will be available to supplement the training received. Make sure and check back once you have been to class.


 Training Schedule - Click on Link Under "Class" to Register

There are no items to show in this view.